null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
3261541
4. Communications and Network Security
Description
5 Mind Maps (CISSP CBK) Mind Map on 4. Communications and Network Security, created by Marisol Segade on 23/08/2015.
No tags specified
mind maps
cissp cbk
5
Mind Map by
Marisol Segade
, updated more than 1 year ago
More
Less
Created by
Marisol Segade
over 9 years ago
80
2
0
Resource summary
4. Communications and Network Security
4.1 Reviewing OSI and TCP/IP Models
OSI Model
All People Seem To Need Data Processing
Network models
TCP/IP model
Network Interface, Internet, Host-to-Host and Application Layer
TCP/IP protocol suite
IPV6 protocol enhancements
Ports and port assignments
DNS and DNSSEC
CISSP Exam Tips
The OSI model is becoming outdated and there are newer technologies that don't fit the model
IPv6 has extensions that support authentication, data integrity and encryption
All responses from DNSSEC protected zones are digitally signed
4.2 Understanding IP Convergence and Extensibility
IP Convergence
IP Extensibility
Intro to VoIP
MPLS
Distributed Network Protocol (DNP3)
Fibre Channel over Ethernet FCoE
CISSP Exam Tips
Extensibility is a new or a modification of existing functionality without significantly altering the original structure
Open standard is a standard that is publicly available and can be freely adopted and extended
MPLS interoperates with IP networkds
4.3 Securing Wireless Networks
Wireless network technologies
Bluetooth (802.15)
Cellular networks
802.11 access modes
Wireless threats and vulnerabilities
Wireless attack vectors
Wi-Fi protection
The Wi-Fi Alliance
CISSP Exam Tips
Bluetooth uses short -wavelength, low-power signals with a maximum range of aprox. 50 feet
GSM and CMDA are multiple access technologies, which allow voice and data on the same radio channel
Wi-Fi is widely adopted , rapidly developing set of technologies
4.4 Using Cryptography to Maintain Communication Security
Internet communications vulnerabilities
SSL/TLS
Secure Shell (SSH)
S/MIME
IPSec
CISSP Exam Tips
SSH requires and SSH server and an SSH client
Secure Shell is a replacement for cleartext telnet, rlogin, rsh and rsync
SSL server may be optionally configured to require client side authentication
4.5 Securing Network Access
Network segmenting
Perimeter devices
NAT
Ingress and egress filtering
Proxy services
Intrusion detection and intrusion prevention services
Honeypots and Honeynets
CISSP Exam Tips
The internet is always considered an untrusted network
Proxy firewalls are bastion hosts (hardened device with connection to the untrusted and trusted network)
Honey pots work by fooling attackers into believing it is a legitimate system
4.6 Securing Data Transmissions
Network data transmission
Layer 1,2,3 connectivity devices
Transmission media
Dedicated & non-dedicated connections
Network cabling
Emanations security
CISSP Exam Tips
Wireless access points are bridges for wireless and wired IP traffic
Shielded twisted pair (STP) reduces EMI vulnerability and crosstalk
Fiber optic has no electromagnetic emanations
4.7 Securing Multimedia Collaboration
VoIP
Remote meeting technology
Instant messaging and chat
Content distribution networks (CDN)
CISSP Exam Tips
VoIP can be a malicious network entry point
Remote meeting technology can be a malicious network entry point
CDN can be a malicious network entry point
4.8 Securing Virtual Private Networks
VPN Technologies
PPTP
L2TP
IPSec in-depth
High assurance internet protocol encryptor (HAIPE)
SSL VPN
CISSP Exam Tips
VPNs are cost-effective alternative to point-to-point connections
SSL VPN use a local browser
HAIPE is an extension of IPsec used in high security networks
4.9 Securing Endpoints
Network access controls (NAC)
Endpoint firewalls
Endpoint IDS/IPS (HIDS)
Proxy servers
Malware protection and detection
Remote location and telecommuting
Mobile device managment
CISSP Exam Tips
NAC is an emerging approach to networks security that attempts to unify endpoint security and enforcement
Malware defense requires a balance of deterrent , preventative, detection and corrective controls
Mobile device management solutions are owner-agnostic
4.10 Preventing and Mitigating Network Attacks
CISSP Exam Tips
Attack anatomy = aquisition, analysis, access and appropiation,
Attacks can violate confidenciality, integrity and availability
Security demands a unified approach and defense-in-depth architecture
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Mind Maps with GoConqr
Manikandan Achan
Mind Maps with GoConqr
croconnor
Mind Maps with GoConqr
Elysa Din
Creating Mind Maps with GoConqr
Andrea Leyden
Creating Mind Maps with GoConqr
Sarah Egan
GoConqr Getting Started Guide
Norman McBrien
Creating Mind Maps with GoConqr
laurie trost
THE WAYS IN WHICH ICT IS USED
antebellsayssup
Mind Maps with GoConqr_1
hurtado13071
The Lungs
Tamara Lancaster
Creating Mind Maps with GoConqr
alisamyfahmy
Browse Library